ShadowTrace
Python script designed for open-source intelligence (OSINT) investigations. It enables users to search for public records, social media profiles, phone number details, and geolocation information—all from a single command-line interface.
Install / Use
/learn @Sh4dowTr4ck3r/ShadowTraceREADME
ShadowTrace
ShadowTrace is a terminal-based OSINT toolkit for digital investigations and cyber reconnaissance.
Current release includes 12 main modules plus report export and API key configuration.
Main Menu Modules
| Option | Module | Purpose | |---|---|---| | 1 | Username Recon | Check a username across common social and developer platforms | | 2 | Username Permutation Engine | Generate username variants and scan them | | 3 | Email Intelligence | Gravatar checks, breach checks, disposable detection | | 4 | IP Intelligence | GeoIP, reverse DNS, abuse intel, Shodan/VT when keys exist | | 5 | Domain Reconnaissance | DNS, cert transparency, subdomains, WHOIS/RDAP, Wayback | | 6 | WiFi Network Recon | Inspect nearby WiFi network details and enrichment | | 7 | Image Metadata / EXIF | Extract image metadata, EXIF tags, and GPS coordinates | | 8 | MAC Address Lookup | Vendor lookup and address-type checks | | 9 | Email Header Analyzer | Parse raw headers or .eml/.txt files | | 10 | Google Dork Generator | Generate targeted dork queries | | 11 | Export Report | Save findings to JSON/HTML/CSV | | 12 | Configure API Keys | Store API keys in local config | | 0 | Exit | Quit ShadowTrace |
Installation
1. Create and activate a virtual environment (recommended)
PowerShell:
python -m venv .venv
.\.venv\Scripts\Activate.ps1
2. Install dependencies
pip install -r requirements.txt
3. Run
python .\shadowtrace.py
If your system has multiple Python installations, make sure you run with the same interpreter where dependencies are installed.
Dependencies
requests(required)Pillow(recommended for full image metadata/EXIF support in option 7)
API Keys (Optional)
ShadowTrace works without API keys, but enrichment improves with:
- Shodan
- HIBP
- AbuseIPDB
- VirusTotal
You can configure keys in two ways:
- From menu option 12 (Configure API Keys)
- By editing
ShadowTrace_config.jsonmanually
Example config:
{
"api_keys": {
"shodan": "YOUR_KEY",
"hibp": "YOUR_KEY",
"abuseipdb": "YOUR_KEY",
"virustotal": "YOUR_KEY"
},
"output_dir": "reports",
"timeout": 10,
"user_agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) ..."
}
Key notes:
ShadowTrace_config.jsonis the runtime config file for API keys and app settings- Keep this file private (it can contain secrets)
- If
hibpis missing, email breach checks fall back to manual lookup links
Where to get API keys:
- Shodan: https://shodan.io
- HIBP: https://haveibeenpwned.com/API/Key
- AbuseIPDB: https://www.abuseipdb.com
- VirusTotal: https://www.virustotal.com
Testing
python .\test_shadowtrace.py
